🕵️♂️ Hands-on threat hunting projects using Sentinel, MDE, and KQL. Includes queries, visualizations, and step-by-step analysis of suspicious activity.
log-analysis incident-response cybersecurity threat-hunting siem tor-browser mde edr azure-security security-operations kql defender-for-endpoint microsoft-sentinel
-
Updated
Aug 4, 2025 - PowerShell